Conditional writes shipped

Private Networking

┌──your VPC───────────────┐
│                         │░
│ ┌─────────┐ ┌─────────┐ │░
│ │ client  │ │ client  │◀┼───┐
│ └─────────┘ └─────────┘ │░  |
│                         │░  |
└─────────────────────────┘░  |
 ░░░░░░░░░░░░░░░░░░░░░░░░░░░  |
                              |
              PrivateLink/PSC |
                              |
┌──tpuf VPC───────────────┐   |
│                         │░  |
│ ┌─────────┐ ┌─────────┐ │░  |
│ │ storage │ │ compute │◀┼───┘
│ └─────────┘ └─────────┘ │░
│                         │░
└─────────────────────────┘░
 ░░░░░░░░░░░░░░░░░░░░░░░░░░░

turbopuffer supports private network connections between your VPC and our multi-tenant regions.

Private network connection across cloud providers (e.g. AWS => GCP) are not supported. Contact us if you need this.

Enforcement

By default, even after establishing a private network connection to a region, API requests for your organization will still be permitted via the public endpoint for the region.

Upon request, turbopuffer can enforce that all API requests for an organization are made via your private endpoints.

Pricing

  • Private networking is only available on the enterprise plan.
  • There are no usage-based fees for private network endpoints.

Setup

  1. Provide turbopuffer support with:

    • Your AWS account ID or your GCP project ID
    • The region you want to establish a private connections to
  2. Wait for turbopuffer to authorize connections from your cloud account

  3. Establish a private network connection to the service name provided by turbopuffer support

  4. Set the base_url in your client to the private endpoint for your region (see table below)

RegionPrivate Endpoint
aws-ap-southeast-2
aws-eu-central-1
aws-eu-west-1
aws-us-east-1
aws-us-east-2
aws-us-west-2
aws-ap-south-1
gcp-us-central1
gcp-us-west1
gcp-us-east4
gcp-northamerica-northeast2
gcp-europe-west3
gcp-asia-southeast1
gcp-gcp-asia-northeast3
Follow
Blog